Software security requirements continue to evolve as risks grow and change. While it's tempting to think that newer, better, or faster tools are all that's needed, the truth is more complex. Simply put, tooling is not enough. Securing software requires a combination of automated and manual processes.
Threat modeling is an important part of the security mix and helps to align people, processes, and technologies to optimize security and development goals.
By thinking like an attacker, threat modeling enables organizations to build security into their software from the start rather than addressing it as an afterthought. When done effectively, threat modeling provides a thorough analysis of system architecture, business context, and artifacts such as functional specifications and user documentation.
This eBook provides an actionable roadmap for organizations to implement or improve threat modeling in their software development life cycle. It examines the six primary activities of a threat model as well as discusses and debunks several misconceptions.